Whitepapers

Explorations of complex business and technical issues and the solutions and methodologies we employ to tackle them head on.

Cloud Application Security

The Preconceived Cloud Security Problem Businesses are overwhelming realizing the benefits of adopting cloud infrastructure strategies. Software, Platform, and Infrastructure “As A Service” options are supporting wholesale Digital Transformation for small to medium...

read more

Secure Session Management

What is a Session? A session is the period of time, post login, that the application is in communication with a user without requiring the user to re-authenticate. The typical mechanism used for this is to assign an HTTP Cookie unique to the session, hence  attacks on...

read more

Shields Are Not Custom Waf Rules. Know The Difference

Shield A shield is a block of code that modifies application behaviour to fix a known exploitable vulnerability. Like a micro service, it becomes a functional part of the application. For the exploitable flaw to be secured, all traffic must flow through the shield,...

read more

6 Common Misconceptions About Application Shielding

Application Shielding is a new tool for many organizations and the subject of several commonly held beliefs which may prevent a security team from fully embracing shielding as a strategic option. The biggest misconceptions we hear at RedShield are: Misconception #1:...

read more

RedShield Overview

THE INTERNET: A BUSINESS ENABLER & RISK   The internet is a huge business enabler; it provides: Lots of apps and services that your employees can leverage for productivity, plus A promotional and distribution mechanism to get your applications or services to...

read more

RedShield GDPR Application Security

Executive Summary The General Data Protection Regulation (GDPR) considers data protection as a fundamental human right of an individual, which includes a “right to the protection” of their personal data. Anyone based in the EU, or anyone handling or targeting the...

read more

RedShield Fundamentals

The Challenge With cyber-crime now bigger than the drug trade, criminal organizations are treating data breaches in a structured fashion. They have teams maintaining current knowledge of the latest published exploits and others researching zero-day exploits. This...

read more

Server And Web App Hygiene

THE CHALLENGE With cyber-crime now bigger than the drug trade, criminal organizations are treating data breach in a structured fashion. They have teams maintaining current knowledge of the latest published exploits and others researching 0-days. This knowledge is feed...

read more

Securing Clientside Authentication

What is a Clientside Authentication? Authentication is the mechanism through which a user proves their identity. Once this has been confirmed, the user is  authorized for identity specific privileges. Clientside authentication is specifically when authentication...

read more

Test drive RedShield

During a test drive, you can see the value of RedShield on one of your websites.
We'll help you make your vulnerabilities vanish, removing the ability to exploit completely.

Discovery call

If you’d prefer one of our consultants to reach out to you as a first step, please leave your contact details.

Test drive RedShield

If you wish to take RedShield for a test drive automatically, you can get started in just a few minutes.